hi,
Posted 24 March 2024 - 06:39 PM
hi,
Posted 24 March 2024 - 07:13 PM
This looks to be a new variant of LockBit 3.0 (Black) / CriptomanGizmo ransomware (used by affiliate or non-LockBit affiliates) which will have a random 9 alpha-numerical character extension appended to the end of the encrypted data filename and typically will leave files (ransom notes) which include the same [random 9 character].README.txt as part of its name. These are some examples.
.hZiV1YwzR .3WbzmF0CC .JxxLLpPns hZiV1YwzR.README.txt 3WbzmF0CC.README.txt JxxLLpPns.README.txt
In your case, the random 9 char naming format of your README.txt ransom note and contents together with the same random 9 alpha-numerical char extension appended to your encrypted files are similar to what we have seen with this ransomware.
3R9qG8i3Z 3R9qG8i3Z.README.txt
Some LockBit 3 Black/CriptomanGizmo ransom notes are known to include a long string of hexadecimal characters comprising a Decryption ID similar to N3ww4v3/Mimic but without an asterisk (*) and extension after the ID numbers.
Your personal DECRYPTION ID: 495927C9CC58D8A36B47827EAE1AEA72 »» Your personal DECRYPTION ID: 9FE85D4F9C7EA210F904E9BC55F74ECA >>>> Your personal DECRYPTION ID: 8F2AC6FD69FFFB2BEF710F5010CA2763 specify your ID - 6800F4848694EC5B39B3525AF9F34521 report your ID - C7EC9516C90F63DF285 YOU LOCK-ID: 7565BD6495000673051C5B6F24EE1B30
Your ransom note contents are similar to what we have seen with this ransomware and includes a personal Decryption ID like those listed above.
>>>> Your personal DECRYPTION ID: 4B75BFA39AA770FC5EA571B04865E784
Unfortunately, there is no known method that I am aware of to decrypt files encrypted by most LockBit 3 (Black)/CryptomanGizmo ransomware as noted here without paying the ransom (not advisable) and obtaining the private encryption keys from those who created the ransomware unless they are leaked or seized & released by authorities. The criminal's master private key is needed for decryption. Without the criminal's master private key, decryption is impossible. That usually means the key is unique (specific) for each victim and generated in a secure way (RSA, AES, Salsa20, ChaCha20, EDA2, ECDH, ECC) that cannot be brute-forced...the public key alone that encrypted files is useless for decryption.
There is an ongoing discussion in this topic where victims can post comments, ask questions and seek further assistance. Other victims have been directed there to share information, experiences and suggestions.
Rather than have everyone with individual topics, it would be best (and more manageable for staff) if you posted any more questions, comments or requests for assistance in the above support topic discussion...it includes experiences by experts, IT consultants, victims and company representatives who have been affected by ransomware infections. To avoid unnecessary confusion, this topic is closed.
Thanks
The BC Staff
.
.
Microsoft MVP Alumni 2023, Windows Insider MVP 2017-2020, MVP Reconnect 2016-2023
Microsoft MVP Consumer Security 2007-2015
Member of UNITE, Unified Network of Instructors and Trusted Eliminators
Retired Police Officer, Federal Agent and Coast Guard Chief
If I have been helpful & you'd like to consider a donation, click
0 members, 1 guests, 0 anonymous users